WO2016037148A1 - System and method of adaptive rate control and traffic management - Google Patents
System and method of adaptive rate control and traffic management Download PDFInfo
- Publication number
- WO2016037148A1 WO2016037148A1 PCT/US2015/048721 US2015048721W WO2016037148A1 WO 2016037148 A1 WO2016037148 A1 WO 2016037148A1 US 2015048721 W US2015048721 W US 2015048721W WO 2016037148 A1 WO2016037148 A1 WO 2016037148A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- processor
- rate
- application
- network
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/25—Flow control; Congestion control with rate being modified by the source upon detecting a change of network conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
- H04L47/2475—Traffic characterised by specific attributes, e.g. priority or QoS for supporting traffic characterised by the type of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/27—Evaluation or update of window size, e.g. using information derived from acknowledged [ACK] packets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
Definitions
- aspects of embodiments of the present invention relate to a system and method of adaptive rate control and traffic management.
- aspects of embodiments of the present invention are directed toward monitoring and controlling traffic on a portable device, such as a smartphone. Further aspects are directed toward a system and method of adaptive rate control and traffic management.
- aspects of embodiments of the present invention address these and other concerns by providing detection and control of application-level data usage from within the mobile device.
- aspects of the present invention provide for significant reduction in data consumption by limiting the data rate provided to a mobile app, such as with adaptive video streams.
- Further aspects provide for reduction in radio signaling and cellular congestion by receiving data to the app/device in bursts to reduce the total amount of time a device needs to be connected to the cell tower to receive the data.
- Still further aspects provide for fine-grain tracking and control of the network capacity that is allowed/restricted for a mobile app.
- embodiments of the present invention provide for the ability to process the mobile traffic performed by the apps on the mobile device.
- the ability to process this traffic "in band" enables a wide variety of monitoring and control capabilities to be applied to the mobile app traffic.
- the ability to process this traffic within the device enables these capabilities across any network accessed by the device.
- Embodiments of the present invention provide for multiple ways in which in-band monitoring and control may be achieved on a mobile device, such as using a proxy configuration, a VPN tunnel device, or request interception within the mobile app.
- Embodiments of the present invention are directed to improving or optimizing bandwidth of data streaming applications (such as video or audio).
- Embodiments of the present invention are directed to storing some content temporarily (such as pre-fetching the next few video chunks), including streaming files that are amenable to video or audio streaming technology, such as ABR (adaptive bitrate) that adjusts the quality of the multimedia stream to match that of the available bandwidth with which to transmit the stream.
- ABR adaptive bitrate
- Embodiments of the present invention are directed to adaptive bitrate (ABR) control (such as optimizing the app to request data in such a manner as to minimize bandwidth usage with existing protocols) and to connection control (such as minimizing connection time to the network to that needed to get data as efficiently as possible).
- ABR adaptive bitrate
- Embodiments of the present invention are directed to bitrate control of data speed, pre-fetching stream chunks (in advance of the app requesting it, to avoid opening a connection later), policy-based rules to determine the desired bitrate control speed for the bitrate control of the data speed and the amount of pre-fetch when pre-fetching the stream chunks (such as video stream chunks), as well as for allowing and disallowing certain requests (for example, to control or limit an app's use of the network).
- bitrate control of data speed may be used, for example, to reduce bandwidth use, and may be combined with pre-fetching the stream chunks in some cases to reduce connection time, such as for streaming content (e.g., video).
- streaming content e.g., video
- endpoint traffic management Another term for the policy- based rules to control these is "endpoint traffic management," which may be used to limit the type and frequency of requests that apps can perform.
- a key aspect of all of these techniques is that they have not been enabled previously on an endpoint device, such as a smartphone or tablet.
- an adaptive bitrate determines how the data is being delivered and optimizes requests from the client to take advantage of that (buffering excess content until the user really wants it).
- the bitrate control determines how quickly data is being delivered to the app requesting it. For example, this may apply to "adaptive bit rate streams," where the app has a choice of multiple sizes of an item to request (e.g., the same video at multiple resolutions) and slowing down the pace will cause the app to choose the smaller sized version (thus using less bandwidth).
- connection control tries to make the most use of a connection period, then disconnect to allow other applications/users access to the network until it needs access again.
- traffic management adds numerous usability features (security, usage monitoring, etc.) not currently available to a system.
- these features may be either usability (for an end user) or
- control/protection for the network operator e.g., cellular provider.
- they may rely on or have a traffic manager (such as a proxy) sitting in a central point of traffic flow on the endpoint device so that it may apply policies and make decisions.
- a traffic manager such as a proxy
- a method of communication traffic management on a portable communication device having a computer processor and a network connection to a computer server for transmitting or receiving data with the processor over a network includes: identifying, by a traffic manager application running on the processor, a first application running on the processor and delivering first data to or from the server over the network; intercepting, by the traffic manager application, electronic traffic of the first data to or from the first application; and controlling, by the traffic manager application, a rate of delivery of the first data to or from the first application or to or from the server.
- the controlling of the rate of delivery of the first data may include throttling a present speed of the network as perceived by the first application to a first data rate less than the present speed of the network.
- the electronic traffic of the first data may include data being transmitted using a secure protocol for Hypertext Transfer Protocol (HTTPS).
- HTTPS Hypertext Transfer Protocol
- the controlling of the rate of delivery of the first data may include throttling the rate of delivery of the first data to or from the server to a first data rate less than a present speed of the network.
- the electronic traffic of the first data may include an adaptive bitrate stream.
- the electronic traffic of the first data may include a progressive stream.
- the first application may be capable of supporting a plurality of data rates having different corresponding resolutions as controlled by a manifest.
- the controlling of the rate of delivery of the first data may include editing the manifest to hide or remove those of the data rates that exceed a first data rate.
- the first application may be capable of supporting a plurality of data rates having different corresponding resolutions.
- the controlling of the rate of delivery of the first data may include failing or blocking access to those of the data rates that exceed a first data rate.
- the method may further include: identifying, by the traffic manager application, a second application running on the processor and delivering second data to or from the server over the network; intercepting, by the traffic manager application, electronic traffic of the second data to or from the second application; and controlling, by the traffic manager application, a rate of delivery of the second data to or from the second application or to or from the server.
- the controlling of the rates of delivery of the first and second data may include concurrently limiting the rates of delivery of the first and second data so that the rate of delivery of the first data exceeds the rate of delivery of the second data.
- the intercepting of the electronic traffic may include using an internal proxy running on the processor.
- the intercepting of the electronic traffic may include using a virtual private network (VPN) interface on the processor.
- the intercepting of the electronic traffic may include running a modified said first application on the processor, the modified first application being configured to request the intercepting of the electronic traffic.
- VPN virtual private network
- a system for communication traffic management includes a portable communication device having a computer processor and a network connection to a computer server for transmitting or receiving data with the processor over a network, and a nonvolatile storage device coupled to the processor.
- the nonvolatile storage device stores instructions that, when executed by the processor, cause the processor to: identify a first application running on the processor and delivering first data to or from the server over the network; intercept electronic traffic of the first data to or from the first application; and control a rate of delivery of the first data to or from the first application or to or from the server.
- the instructions when executed by the processor, may further cause the processor to control the rate of delivery of the first data by throttling a present speed of the network as perceived by the first application to a first data rate less than the present speed of the network.
- the electronic traffic of the first data may include data being transmitted using a secure protocol for Hypertext Transfer Protocol (HTTPS).
- HTTPS Hypertext Transfer Protocol
- the instructions when executed by the processor, may further cause the processor to control the rate of delivery of the first data by throttling the rate of delivery of the first data to or from the server to a first data rate less than a present speed of the network.
- the electronic traffic of the first data may include an adaptive bitrate stream.
- the electronic traffic of the first data may include a progressive stream.
- the first application may be capable of supporting a plurality of data rates having different corresponding resolutions as controlled by a manifest.
- the instructions when executed by the processor, may further cause the processor to control the rate of delivery of the first data by editing the manifest to hide or remove those of the data rates that exceed a first data rate.
- the first application may be capable of supporting a plurality of data rates having different corresponding resolutions.
- the instructions when executed by the processor, may further cause the processor to control the rate of delivery of the first data by failing or blocking access to those of the data rates that exceed a first data rate.
- the instructions when executed by the processor, may further cause the processor to: identify a second application running on the processor and delivering second data to or from the server over the network; intercept electronic traffic of the second data to or from the second application; and control a rate of delivery of the second data to or from the second application or to or from the server.
- the instructions when executed by the processor, may further cause the processor to control the rates of delivery of the first and second data by concurrently limiting the rates of delivery of the first and second data so that the rate of delivery of the first data exceeds the rate of delivery of the second data.
- the instructions when executed by the processor, may further cause the processor to intercept the electronic traffic by using an internal proxy running on the processor.
- the instructions when executed by the processor, may further cause the processor to intercept the electronic traffic by using a virtual private network (VPN) interface on the processor.
- VPN virtual private network
- the instructions when executed by the processor, may further cause the processor to intercept the electronic traffic by running a modified said first application on the processor, the modified first application being configured to request the intercepting of the electronic traffic.
- FIG. 1 is a schematic diagram of an example mobile device (such as a smartphone) architecture suitable for use with an on-device traffic management implementation according to an embodiment of the present invention.
- FIGs. 2-5 are block diagrams of the software components within a proxy to enable monitoring and control of network traffic between an app and a server according to embodiments of the present invention.
- FIG. 6 is a process timing diagram illustrating the handling of requests between an app and a server through a proxy according to an embodiment of the present invention.
- FIG. 7 is a block diagram of the software components within a proxy to enable monitoring and control of network traffic between an app and a server according to another embodiment of the present invention.
- FIG. 8 is a process timing diagram illustrating the handling of requests between an app and a server through a proxy according to another embodiment of the present invention.
- FIG. 1 is a schematic diagram of an example mobile device (such as a smartphone) architecture 100 suitable for use with an on-device traffic management implementation according to an embodiment of the present invention.
- the mobile device may be an Android phone.
- the mobile device will be assumed to be an Android smartphone.
- mobile devices may be capable of supporting many users, for ease of description, it will be assumed that a mobile device is dedicated to a particular user, so the term "user” and "mobile device” (or any computing device used in a personal or portable manner) may be used synonymously throughout.
- the general architecture on mobile devices provides for a centralized proxy 130 that may monitor or control the data traffic originating from applications (e.g., mobile apps, or just "apps") to, for example, an application server (or app server) 250 that the mobile device accesses, e.g., via a Wi-Fi or cellular network.
- applications e.g., mobile apps, or just "apps”
- an application server or app server 250 that the mobile device accesses, e.g., via a Wi-Fi or cellular network.
- This approach enables traffic management to be performed across multiple networks (e.g., WiFi and cellular) and across multiple apps, and allows the traffic management to be centrally managed, although the present invention is not limited thereto.
- the traffic management may be performed in a distributed manner, such as with a proxy running within each app, where they are operating in a coordinated manner such that the overall device traffic is effectively centrally managed.
- the apps and other programmable components of smartphone 100 may be implemented, for example, as sets of computer instructions stored on a non-transitory storage device of smartphone 100, and configured to be executed on one or more processors of the smartphone 100.
- the proxy 130 may also manage traffic for particular web sites, such as from a web browser. Accordingly, for ease of description, terms such as "application,” “app,” “web site,” or “site” may be used somewhat interchangeably throughout the present application when referring to categories of content being managed by the proxy 130.
- the proxy 130 may be engaged from a number of different mechanisms, such as a proxy server (e.g., via operating system (OS) network settings) using sockets layer 120, a virtual private network (VPN) service (e.g., via OS network settings) using network tunnel (TUN) device 230, or embedded within an app using interception layer 150.
- the proxy 130 may be run on a Java virtual machine (JVM) 160.
- JVM Java virtual machine
- the proxy may include a cache engine 110 for managing cached content on a physical storage device, such as flash memory 170 or other nonvolatile storage device. Without loss of generality, such a device may sometimes be referred to as a "disk,” though it could be any type of non-transitory storage device, such as a solid-state drive.
- the cached or any other stored content may be stored, in whole or in part, on volatile storage, such as random access memory, and this volatile storage may be used in combination with nonvolatile storage, such as in a tiered manner where the most recently accessed content is stored in faster volatile storage before it is transitioned to slower nonvolatile storage.
- volatile storage such as random access memory
- nonvolatile storage such as in a tiered manner where the most recently accessed content is stored in faster volatile storage before it is transitioned to slower nonvolatile storage.
- the proxy 130 may run in a variety of form factors, such as an application, kernel driver, or within the OS on the mobile device, and be configured to receive network connections, for example, via OS network settings.
- the proxy server may run in a JVM.
- the proxy 130 may act as an intermediary on behalf of client applications. For example, the proxy 130 may service the request of an app 180 running in another JVM 165.
- the app 180 may want to access the Internet using, for example, an Android service such as HttpURLConnection 190.
- HTTP stands for hypertext transfer protocol
- URL stands for uniform resource locator (e.g., a web address).
- HttpURLConnection 190 may then invoke network services 200 to access the Internet.
- Network services 200 may access the Internet, for example, using access point name (APN) 210 (e.g., a mobile network such as 3G) or Wi-Fi connection 220.
- APN access point name
- Network services 200 may be configured to route requests from app 180 to proxy server 130 using a proxy configuration applied globally to the system, or to the APN or WiFi connection.
- Network services 200 may also route requests from app 180 to proxy 130 using a variety of other ways, for example, via network tunnel (TUN) device 230 or IP routing tables (also known as "iptables").
- TUN network tunnel
- IP routing tables also known as "iptables"
- Network services 200 may be configured to specify a proxy directly or indirectly (e.g., as a global system proxy directly detected and used by apps running on the device, or indirectly through a setting on the APN 210 or Wi-Fi connection 220) to access the Internet, such that a request may be sent through a standard communications layer, such as sockets 120 (e-g-, a network socket for connecting to the Internet), which is received by the proxy 130.
- the proxy 130 may make a request to the app server 250 through network services 200 (while bypassing the APN or Wi-Fi proxy configuration to avoid looping back to itself), which services the request and returns any responding communications to the proxy 130.
- the proxy may then monitor or control the communications between apps and servers.
- the proxy 130 may also cache some, none, or all of the response via the caching engine 110 before returning the response through the network socket 120 to the app 180 through the same described stages in reverse.
- the network services 200 may also be configured to route requests to proxy server 130 through a variety of other means.
- a network tunnel (TUN) 230 may route network activity to VPN service 140 to handle the network transmission.
- the VPN service 140 may then route the request to the proxy 130 to manage the traffic between the app and app server 250 using the sockets 120 (as appropriate) to service the request and return the response via the network tunnel 230.
- Another mechanism for engaging the proxy 130 is to use an interception layer (such as interception layers 150 and 155) within an app to redirect traffic to the proxy process.
- an interception layer such as interception layers 150 and 155
- HttpURLConnection may have an interception layer 150 intercept the request from app 180 and directly forward its traffic to the proxy 130. Forwarding to the proxy 130 from intercept 150 may be performed through network services 200 or using standard inter-process communications mechanism as would be apparent to one of ordinary skill in the art, such as message queues, named pipes, or shared memory.
- the proxy 130 may be embedded within the requesting process, such as JVM 165 or Browser 185 (such as a web browser). The proxy 130 may then manage the app's network traffic without the need for any inter-process communications.
- the web browser 185 seeks to access the Internet. Similar to the app 180 above, the web browser 185 may take advantage of the proxy 130 by a number of different approaches. For example, the web browser 185 may be configured to access the Internet by using network sockets 125, which could then use network services 200 to access the app server 250 and/or the proxy 130 using, for example, sockets 120 or VPN service 140 as described above. In a similar fashion, interception layer 155 may be added to the web browser 185, which may then intercept the request from the web browser 185 and forward its traffic to the proxy 130.
- SSL Secure Sockets Layer
- proxy 130 may be configured as the proxy for all or a subset of network protocols, such as only for HTTP, HTTPS, or both.
- proxy 130 may be configured as the proxy for all or a subset of network interfaces, such as for cellular, WiFi, or both.
- APN 210 access the cellular access point may be set to the proxy 130.
- ⁇ Internet Protocol routing table entries may be set.
- the VPN client such as VPN service 140
- Wi-Fi the proxy 130 may be set for each Wi-Fi access point (AP).
- AP Wi-Fi access point
- the system may direct traffic for all application traffic to the proxy 130.
- FIG. 1 is directed mostly to the architecture 100 of a mobile device, on- device traffic management may also entail other components, such as software components configured to run on one or more processors of mobile device 100.
- FIGs. 2-5 are block diagrams of the software components within a proxy 130 to enable monitoring and control of network traffic between an app 310 and a server 250 according to embodiments of the present invention.
- the app 310 running within the mobile device 100 communicates with app server 250, and proxy 130 would intercept the app's network traffic using any of the methods previously discussed, such as through a system proxy setting or VPN.
- proxy 130 there are logical software components that perform the network traffic monitoring and control, and these software components may include a ClientHandler 320 that may handle the data path 325 with app 310 and a RequestHandler 330 that may handle the data path 335 with app server 250.
- the data path 325 between app 310 and ClientHandler 320 may take place over different mechanisms, depending on the method used to intercept the app's network traffic, such as a network socket or any other standard inter-process communications mechanism as would be apparent to one of ordinary skill.
- the data path 335 between RequestHandler 330 and app server 250 may also take place over different mechanisms, depending on how the app 310 would normally communicate with app server 250, such as with a network socket using TCP/IP.
- proxy 130 By decoupling the internal data path with app 310 and the external data path with app server 250, this allows proxy 130 to separately control the data rates between app 310 and app server 250, such as to deliver data to/from app 310 (over data path 325) at a slower rate than may actually be delivered to/from app server 250 (over data path 335).
- a BitrateManager 340 may be used to manage the appropriate bitrate (also known as data rate) to/from app 310 or to/from app server 250.
- This allows a separate software component to implement one or more policies for the bitrate, such as different bitrates for different users, different bitrates for different apps, different bitrates based on prior data consumption, different bitrates for different network types, and other variations as would be apparent to one of ordinary skill in the art.
- a policy to implement bitrates for different users may consist of a list of users or user categories, where a user category may be any group of users, such as by device type (e.g., smartphone vs tablet), device model, or data plan.
- a policy to implement different bitrates for different apps may include a list of bitrates per app or app categories, where an app category may be any grouping of apps, such as by functionality (e.g., video, social, email, etc.), by vendor or by some other category (e.g., work vs personal).
- an app category may be any grouping of apps, such as by functionality (e.g., video, social, email, etc.), by vendor or by some other category (e.g., work vs personal).
- An app-based policy also may be based on how or when an app runs, such as allowing higher bitrates when the app is visible to the user (e.g., running in the foreground as opposed to the background), or enforcing lower bitrates for low priority apps when a higher priority app is running.
- a policy to implement different bitrates for different network types may include a list of bitrates per network type (e.g., WiFi, LTE, HSPA, CDMA, etc.) or a list of specific networks, such as specific cell towers or WiFi hotspots.
- a network-based policy may also be based on ownership or costs associated with the network, such as higher bitrates when accessing home network owned by the operator of the user's data plan but lower bitrates when the user is roaming on the network owned by another operator.
- the rate limits being managed by BitrateManager is not limited to being just at the bit level and may also include limits on the rate of traffic in other increments or units, such as by requests, packets (e.g. TCP segments or IP packets), network connections, or other granularities apparent to anyone of ordinary skill in the art. For example, it may be desirable to limit the frequency of requests by "chatty" apps on certain network types to
- Some types of networks e.g., 2G and 3G cellular networks
- Any of the aforementioned policies may be, for example, provided by the user, pre-configured by the app, or received from an external system, such as a management server. Any of the aforementioned policies may also be extended to have multiple or variable rate limits, such as rate limits that vary based on earlier data usage or traffic activity. For example, an app-based policy may allow multiple bitrate levels that decrease as an app's data consumption increases, such as to allow apps with lower data consumption to operate at a higher (or even unbounded) bitrate while limiting higher bandwidth apps as they exceed one or more thresholds.
- RequestHandler 320 when app 310 performs a request to receive data from app server 250, the request would be initially received by ClientHandler 320, which then passes it to the appropriate type of RequestHandler 330 needed to process the request.
- Proxy 130 may support one or more types of RequestHandlers, such as a PassthroughHandler 331 in FIG. 3 that may pass the request through to app server 250.
- Another type of RequestHandler may be a ServeFromCacheHandler 332 in FIG. 4 that may respond to the request with contents from cache, by interacting with Cache Engine 110 and with app server 250 as needed to validate the freshness of the cached data.
- a further type of RequestHandler may be a
- ThrottlingHandler 333 in FIG. 5 may control the rate of data path with app server 250, such as by sending request data or receiving response data at a lower rate than may otherwise by supported by the external network or server.
- each type RequestHandler may be implemented as a subclass of the RequestHandler superclass. The RequestHandler is responsible for responding to the request and providing the response to ClientHandler 320, which then transmits the response to app 310.
- ClientHandler 320 When ClientHandler 320 receives response data from a RequestHandler, it may send the response data to app 310 and it may control how quickly that data is sent based on a rate limit provided to it by BitrateManager 340. ClientHandler 320 may implement the rate limit in a variety of methods apparent to one of ordinary skill, such as by sending a specific amount per time interval until the entire response is transmitted. In one embodiment of the present invention, ClientHandler 320 may be configured to transmit data to app 310 every second, so as data is received from app server 250, ClientHandler 320 will transmit data every second in an amount no higher than the per-second rate limit specified by BitrateManager 340.
- BitrateManager 340 indicates to ClientHandler 320 that it should limit the data rate for app 310 to 1000 kilobits per second, then ClientHandler 320 will transmit up to 1000 kilobits to app 310 every second until the entire response is transmitted. This allows RequestHandler 330 to receive data from app server 250 at a different (e.g., higher) rate than the rate that ClientHandler 320 is transmitting that data to app 310.
- RequestHandler 330 may receive data from app server 250 at a higher rate than ClientHandler 320 is sending that data to app 310 by storing the data in device memory, which may be volatile or non- volatile. Non- volatile memory may be more plentiful so it may be used if a large amount of data needs to be buffered, such as when the data is being received from app server 250 at a significantly higher rate than the rate ClientHandler 320 is transmitting to app 310. According to an embodiment of the present invention,
- ThrottlingHandler 333 may manage the buffering, such as to store a portion of the data received from app server 250 to non- volatile memory when ClientHandler 320 is not yet ready to transmit it to app 310. ThrottlingHandler 333 may also limit how much or how quickly it receives data from app server 250, such as to avoid exceeding the memory or storage available on the device.
- data path 335 may be a TCP-based network socket and
- ThrottlingHandler 333 may stop receiving data from the network socket, which would cause app server 250 to stop sending data when the TCP receive window on that network socket is full.
- a RequestHandler such as ThrottlingHandler 333, may analyze the data received from app server 250 to determine the rate at which it receives data from app server 250.
- video data may be desirable to receive video data at the rate at which the data is actually consumed by a video app, such as to avoid receiving video data that would not be consumed if the user stops watching (but continues receiving) the video.
- This approach may be applied to different types of apps, since there generally is little or no relationship between how quickly an app consumes data and how quickly the network/server is capable of delivering that data.
- a MPEG-4 video may be encoded at a bitrate that is lower than the rate that a mobile device may currently receive that video data from the
- One or more embodiments of the present invention may address this by aligning the video encoding bitrate with the network delivery bitrate.
- Proxy 130 may coordinate the video and network bitrates by parsing the data received from app server 250.
- ThrottlingHandler 333 may parse the received data to determine the video encoding bitrate, which it may use to determine the rate at which it will receive data from app server 250. For example, using the prior example, when
- ThrottlingHandler 333 detects a video encoded at 2 mbps, it may ensure that it receives data from app server 250 at an equivalent rate, perhaps adjusted slightly higher to accommodate any known/detected variations in the network delivery rate.
- embodiments of the present invention may reduce the data consumption of content that adapts its data size based on the rate, such as adaptive bitrate (ABR) video streams.
- ABR streaming technologies include Dynamic Adaptive Streaming over HTTP (DASH), Adobe Adaptive Streaming for Flash, HTTP Live Streaming (HLS), and Microsoft Smooth Streaming.
- DASH Dynamic Adaptive Streaming over HTTP
- HLS HTTP Live Streaming
- Microsoft Smooth Streaming For example,
- YouTube videos are encoded for a wide variety of video resolutions, each of which corresponds to a particular data delivery rate, such that the YouTube app requests the highest video resolution that may be supported by its perceived rate of data delivery.
- the table below shows the estimated data usage rates for the YouTube app corresponding to each video resolution quality, where the YouTube app will select the resolution only if the perceived network speed exceeds the data usage rate corresponding to that video.
- Proxy 130 effectively controls which resolution is selected by the YouTube app by using a bitrate limit at or just above the desired video resolution.
- bitrate limit to ABR streams is that the total data consumption may be significantly reduced, up to over 90% when compared to the highest possible resolution, without causing any delay or buffering of the video. The only impact would be on a lower resolution video, and a user may be willing to view a lower resolution video to save on their data usage costs. As shown in the table, the data usage difference is substantial between each resolution level, and generally increases faster than the
- a 2x increase in resolution from 360p to 720p will result in a 3.4x increase in data consumption.
- a reduction by just one resolution level may have a significant reduction in data usage, such as a resolution reduction from 1080p to 720p is 33% but will yield 53% in data usage reduction. On a small mobile device, this may have little discernable visible difference in quality for the user, while providing data savings of over 50%.
- FIG. 6 is a process timing diagram illustrating the handling of requests between an app and a server through a proxy according to an embodiment of the present invention.
- FIG. 6 illustrates an embodiment of the present invention where the bitrate is limited, such as to reduce data consumption on a cellular connection.
- ClientHandler 320 may determine how to handle it or it may provide the request to RequestManager 350 to make the determination, which may assign ThrottlingHandler 333 for handling the request.
- ThrottlingHandler 333 may consult with BitrateManager 340 at step 415 to determine the appropriate bitrate limit to apply, such as based on policies associated with the app, the network type, or the type of data being requested.
- ClientHandler 320 submits the request to ThrottlingHandler 333 at step 420, which handles the interaction with app server 250 to process the request.
- ThrottlingHandler 333 may parse the response, such as to determine the rate it should receive the data from the server. As the response data is received from app server 250,
- ThrottlingHandler 333 may store the response data in either volatile storage, non- volatile memory, or a combination thereof at step 430. As data is received from app server 250, ClientHandler 320 at step 435 may transmit the stored response data to app 310, which may occur at a different rate than the rate it was received by ThrottlingHandler 333 from app server 250. This continues as additional response data is received at step 440 for the first request. When the response is complete, app 310 may continue to issue additional requests for subsequent data at step 445, such as for ABR video streams that are broken up into separate time-based chunks that may be individually addressable via HTTP URLs. FIG. 6 may be assumed to continue until the data requested by app 310 is complete, as would be apparent to someone of ordinary skill in the art.
- the bitrate limit may be controlled through other means, such as by modifying a list of streams that are being reported by app server 250.
- ABR streaming approaches rely on having the server notify the app of the available streams via a list called a manifest.
- the app will obtain the manifest from the server and select a stream to play, where the selection would typically be based on the network speed perceived by the app. Therefore, another approach to controlling the bitrate is to modify the manifest received from the server, such as to limit the available streams to the app.
- proxy 130 may modify the manifest and remove the higher resolution video streams from it before transmitting the manifest to app 310, thus limiting app 310 to only being able to play the streams remaining in the manifest.
- This approach may be applied to any streaming approach where the server provides or advertises multiple streams to the client, where the set of available streams may then be modified by embodiments of the present invention.
- another means by which the bitrate limit may be controlled is by rejecting or otherwise blocking access to one or more of the streams within the set of streams provided or advertised by the server.
- proxy 130 may allow access to one or more of the available streams requested by app 310, while blocking access to other streams, which would effectively allow proxy 130 to limit app 310 to those streams that are allowed within the policies specified by
- BitrateManager 340 There is a variety of ways that access to streams may be blocked, including rejecting the connection, returning an error for the request, or allowing the request to time out. This approach may be selectively applied to specific apps that support it, since some apps may not be able to properly support certain blocking mechanisms and may need to be blocked in specific ways.
- proxy 130 may support receiving data in bursts, such that the size or frequency of how data is received by the device from app server 250 differs from how app 310 may otherwise request or receive the data. For example, it may be desirable to download only the next partial portion of a video as it is watched, such as the next 30 seconds instead of an entire 5 minute progressive video, because the user may not watch the entire video. In such a case, for example, a fast network and a fast server may allow the entire 5 minute video to be downloaded even though only 10 seconds were watched by the user, all of which still counts against the user's data plan.
- a cellular radio may stay in active, high power mode because its inactivity timer may be longer (e.g., 15 seconds) than the amount of video being downloaded each time (e.g., 5 seconds).
- this may result in increased cell tower signaling, congestion, and device battery consumption.
- it may be desirable to receive data in different burst sizes, so as to draw a balance between downloading enough to allow the cellular radio to become idle without downloading too much to avoid wasting unconsumed data.
- FIG. 7 is a block diagram of the software components within a proxy 130 to enable monitoring and control of network traffic between an app 310 and a server 250 according to another embodiment of the present invention.
- FIG. 7 illustrates an embodiment of the present invention where a BurstingHandler 334 is a type of RequestHandler provided to request or receive data in bursts from app server 250, such that this data may be requested or received in different amounts or at different frequencies than would otherwise be done by app 310 without proxy 130 or BurstingHandler 334.
- BurstingHandler 334 requests data from app server 250 on data path 335 independently from the ClientHandler 320 sending/receiving data to app 310 on data path 325.
- BurstingHandler 334 may coordinate with BitrateManager 340 to determine the appropriate rate to request/receive data from app server 250, based upon various factors (for example, to improve or maximize efficiency and performance).
- factors that increase or maximize the idle time of a cellular connection may include the network type (e.g., LTE, EDGE, etc.), effective network speed, network inactivity timer (e.g., 15 seconds), and video encoding bitrate.
- the network type e.g., LTE, EDGE, etc.
- effective network speed e.g., 15 seconds
- network inactivity timer e.g. 15 seconds
- video encoding bitrate e.g. 15 seconds
- the bitrate ratio is the ratio between the video encoding bitrate and the network delivery bitrate, such as a value of 0.5 when the video is encoded at 2 MBs per second and the data delivery rate from the network is 4 MBs per second.
- the desired idle time is 45 seconds, such as to allow for a 15 second inactivity time window to be followed by a 30 second dormancy time window, then the burst size is calculated as:
- FIG. 8 is a process timing diagram illustrating the handling of requests between an app 310 and a server 250 through a proxy 130 according to another embodiment of the present invention.
- FIG. 8 illustrates an embodiment of the present invention where bursting is performed, such as to increase or maximize idle time for a cellular connection.
- ClientHandler 320 may determine how to handle it or it may provide the request to RequestManager 350 at step 510 to make the determination, which may assign BurstingHandler 334 for handling the request.
- ClientHandler 320 submits the request to BurstingHandler 334 at step 515, which handles the interaction with app server 250 to process the request.
- BurstingHandler 334 may parse the response, such as to determine the rate it should receive the data from the server and it may also coordinate with ClientHandler 320 to set the rate the data should be transmitted to app 310. As the response data is received from app server 250, BurstingHandler 334 may store the response data in either volatile memory, non- volatile memory, or a combination thereof at step 525. BurstingHandler 334 may calculate a burst size and begin receiving additional data up to the determined burst size at step 530 based on policies, such as achieving a minimum cellular idle time. If the data stream includes one or more individually addressable chunks of data, such as each one being individually addressed via HTTP URLs, BurstingHandler 334 may issue the necessary requests to receive data up to the target burst size.
- BurstingHandler 334 may then stop receiving data at step 535, which may include closing the associated network connection, such as for a TCP connection, which begins the start of the target idle time.
- ClientHandler 320 at step 540 may transmit the stored response data to app 310, which may occur at a different rate than the rate it was received by
- BurstingHandler 334 from app server 250. This continues at step 545 and beyond as needed until the data that was received in the first burst has been transmitted to app 310.
- BurstingHandler 334 at step 550 may begin requesting subsequent data from app server 250, and begin storing the next burst at step 555 for
- ClientHandler 320 which may then transmit the subsequent response data to app 310 at a rate that may differ from the rate it was received by BurstingHandler 334 from app server 250.
- FIG. 8 may be assumed to continue until the data requested by app 310 is complete, as would be apparent to someone of ordinary skill in the art.
Abstract
Description
Claims
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP19193880.2A EP3609164B1 (en) | 2014-09-05 | 2015-09-04 | System and method of adaptive rate control and traffic management |
AU2015311691A AU2015311691B2 (en) | 2014-09-05 | 2015-09-04 | System and method of adaptive rate control and traffic management |
KR1020177009163A KR102491452B1 (en) | 2014-09-05 | 2015-09-04 | System and method of adaptive rate control and traffic management |
CN201580060453.6A CN107113248B (en) | 2014-09-05 | 2015-09-04 | System and method for adaptive rate control and traffic management |
JP2017512981A JP6606176B2 (en) | 2014-09-05 | 2015-09-04 | Adaptive rate control and traffic management system and method |
CA2997611A CA2997611A1 (en) | 2014-09-05 | 2015-09-04 | System and method of adaptive rate control and traffic management |
EP15837806.7A EP3189486B1 (en) | 2014-09-05 | 2015-09-04 | System and method of adaptive rate control and traffic management |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462046874P | 2014-09-05 | 2014-09-05 | |
US62/046,874 | 2014-09-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016037148A1 true WO2016037148A1 (en) | 2016-03-10 |
Family
ID=55440428
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2015/048721 WO2016037148A1 (en) | 2014-09-05 | 2015-09-04 | System and method of adaptive rate control and traffic management |
Country Status (7)
Country | Link |
---|---|
EP (2) | EP3609164B1 (en) |
JP (2) | JP6606176B2 (en) |
KR (1) | KR102491452B1 (en) |
CN (1) | CN107113248B (en) |
AU (1) | AU2015311691B2 (en) |
CA (1) | CA2997611A1 (en) |
WO (1) | WO2016037148A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112205036A (en) * | 2018-05-31 | 2021-01-08 | 摩博菲乐有限公司Dba摩博莱 | System and method for dynamic channel bonding |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110505660B (en) * | 2019-07-23 | 2023-07-14 | 维沃移动通信有限公司 | Network rate adjusting method and terminal equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7286471B2 (en) * | 2002-03-23 | 2007-10-23 | Mindspeed Technologies, Inc. | Dynamic bandwidth allocation for wide area networks |
US20130114408A1 (en) * | 2011-11-04 | 2013-05-09 | Cisco Technology, Inc. | System and method of modifying congestion control based on mobile system information |
US20130159150A1 (en) * | 2011-12-19 | 2013-06-20 | Verizon Patent And Licensing, Inc. | Mobile device data metering, bandwidth allocation, and traffic control |
US8897292B2 (en) * | 2012-12-31 | 2014-11-25 | Telefonaktiebolaget L M Ericsson (Publ) | Low pass filter for hierarchical pipelined distributed scheduling traffic manager |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6532593B1 (en) * | 1999-08-17 | 2003-03-11 | General Instrument Corporation | Transcoding for consumer set-top storage application |
US8527647B2 (en) * | 2009-10-06 | 2013-09-03 | Unwired Planet, Inc. | Managing network traffic using intermediate flow control |
US9043433B2 (en) * | 2010-07-26 | 2015-05-26 | Seven Networks, Inc. | Mobile network traffic coordination across multiple applications |
US9398103B2 (en) * | 2011-04-15 | 2016-07-19 | Qualcomm Incorporated | Methods and apparatus for enhancing device performance through flow control |
US8683013B2 (en) * | 2011-04-18 | 2014-03-25 | Cisco Technology, Inc. | System and method for data streaming in a computer network |
WO2013017165A1 (en) * | 2011-08-02 | 2013-02-07 | Telefonaktiebolaget L M Ericsson (Publ) | Shaping media traffic based on manifest file in http adaptive streaming |
EP2910001A4 (en) * | 2012-10-18 | 2016-04-20 | Giraffic Technologies Ltd | A congestion control method for dynamically maximizing communication link throughput |
US20140226571A1 (en) * | 2013-02-13 | 2014-08-14 | Qualcomm Incorporated | Apparatus and method for enhanced application coexistence on an access terminal in a wireless communication system |
CN103560862B (en) * | 2013-10-18 | 2017-01-25 | 华为终端有限公司 | Mobile terminal and coding-rate control method thereof |
-
2015
- 2015-09-04 JP JP2017512981A patent/JP6606176B2/en active Active
- 2015-09-04 EP EP19193880.2A patent/EP3609164B1/en active Active
- 2015-09-04 CA CA2997611A patent/CA2997611A1/en active Pending
- 2015-09-04 WO PCT/US2015/048721 patent/WO2016037148A1/en active Application Filing
- 2015-09-04 KR KR1020177009163A patent/KR102491452B1/en active IP Right Grant
- 2015-09-04 CN CN201580060453.6A patent/CN107113248B/en active Active
- 2015-09-04 AU AU2015311691A patent/AU2015311691B2/en active Active
- 2015-09-04 EP EP15837806.7A patent/EP3189486B1/en active Active
-
2019
- 2019-10-17 JP JP2019189817A patent/JP6974412B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7286471B2 (en) * | 2002-03-23 | 2007-10-23 | Mindspeed Technologies, Inc. | Dynamic bandwidth allocation for wide area networks |
US20130114408A1 (en) * | 2011-11-04 | 2013-05-09 | Cisco Technology, Inc. | System and method of modifying congestion control based on mobile system information |
US20130159150A1 (en) * | 2011-12-19 | 2013-06-20 | Verizon Patent And Licensing, Inc. | Mobile device data metering, bandwidth allocation, and traffic control |
US8897292B2 (en) * | 2012-12-31 | 2014-11-25 | Telefonaktiebolaget L M Ericsson (Publ) | Low pass filter for hierarchical pipelined distributed scheduling traffic manager |
Non-Patent Citations (1)
Title |
---|
See also references of EP3189486A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112205036A (en) * | 2018-05-31 | 2021-01-08 | 摩博菲乐有限公司Dba摩博莱 | System and method for dynamic channel bonding |
CN112205036B (en) * | 2018-05-31 | 2024-04-02 | 摩博菲乐有限公司Dba摩博莱 | System and method for dynamic channel bonding |
Also Published As
Publication number | Publication date |
---|---|
EP3609164A1 (en) | 2020-02-12 |
AU2015311691A1 (en) | 2017-04-20 |
EP3189486B1 (en) | 2019-08-28 |
JP2017530624A (en) | 2017-10-12 |
KR102491452B1 (en) | 2023-01-20 |
CN107113248B (en) | 2021-03-19 |
EP3189486A4 (en) | 2018-04-11 |
KR20170063678A (en) | 2017-06-08 |
JP6974412B2 (en) | 2021-12-01 |
JP2020043568A (en) | 2020-03-19 |
AU2015311691B2 (en) | 2020-11-26 |
EP3609164B1 (en) | 2021-03-31 |
CA2997611A1 (en) | 2016-03-10 |
EP3189486A1 (en) | 2017-07-12 |
CN107113248A (en) | 2017-08-29 |
JP6606176B2 (en) | 2019-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11570114B2 (en) | System and method of adaptive rate control and traffic management | |
US10305952B2 (en) | Preference-aware content streaming | |
US9571407B2 (en) | Strategically scheduling TCP stream transmissions | |
JP2017005761A (en) | Multicast broadcast multimedia service-assisted content distribution | |
US9203888B2 (en) | Server-side class-of-service-based bandwidth management in over-the-top video delivery | |
US20150172352A1 (en) | System and Method of Adaptive Bit-Rate Streaming | |
US11259352B2 (en) | Systems, methods, and media for providing multi-homing | |
US11012908B2 (en) | Systems and methods for dynamic channel bonding | |
WO2013019267A1 (en) | System and method for adapting video communications | |
EP2740265A1 (en) | System and method for adapting video communications | |
US10070348B2 (en) | Hypertext transfer protocol support over hybrid access | |
US10687341B2 (en) | Systems, methods, and media for scheduling traffic of a communication session between an application on a WiFi network and another device | |
US11343322B2 (en) | Virtual edge node as a service | |
JP6974412B2 (en) | Adaptive rate control and traffic management systems and methods | |
US11297634B2 (en) | Systems, methods, and media for scheduling traffic of a communication session between an application on a WiFi network and another device | |
EP3408996A1 (en) | Preference-aware content streaming |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15837806 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2017512981 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20177009163 Country of ref document: KR Kind code of ref document: A |
|
REEP | Request for entry into the european phase |
Ref document number: 2015837806 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2015837806 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2015311691 Country of ref document: AU Date of ref document: 20150904 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2997611 Country of ref document: CA |